Numeric Errors Affecting qemu package, versions <0.9.1-10
Snyk CVSS
Attack Complexity
Low
Confidentiality
High
Threat Intelligence
EPSS
0.67% (80th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-QEMU-427816
- published 24 Dec 2008
- disclosed 24 Dec 2008
Introduced: 24 Dec 2008
CVE-2008-5714 Open this link in a new tabHow to fix?
Upgrade Debian:unstable
qemu
to version 0.9.1-10 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream qemu
package and not the qemu
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
Off-by-one error in monitor.c in Qemu 0.9.1 might make it easier for remote attackers to guess the VNC password, which is limited to seven characters where eight was intended.
References
- https://security-tracker.debian.org/tracker/CVE-2008-5714
- http://lists.gnu.org/archive/html/qemu-devel/2008-11/msg01224.html
- http://lists.gnu.org/archive/html/qemu-devel/2008-12/msg00498.html
- http://svn.savannah.gnu.org/viewvc/trunk/monitor.c?root=qemu&r1=5966&r2=5965&pathrev=5966
- http://svn.savannah.gnu.org/viewvc/?view=rev&root=qemu&revision=5966
- http://xforce.iss.net/xforce/xfdb/47683
- http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
- http://secunia.com/advisories/33568
- http://secunia.com/advisories/34642
- http://secunia.com/advisories/35062
- http://www.securityfocus.com/bid/33020
- http://www.ubuntu.com/usn/usn-776-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47683